NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check first incase it's already been processed.

Home - Found Passwords from Not Found Lists - Any info on this hash type?

1 Results - Page 1 of 1 -
Author Message

Status: n/a
Joined: Sun, 07 Jan 2018
Posts: 6
Reputation: 0 Reputation
Thu, 05 Jul 2018 @ 14:09:59


This isn't a hash cracking request. I was wondering if anyone has any info on the hash types in the mystudiyo leak. It seems a mix of MD5, with mostly SHA1 and possibly MySQL5, VB, IPB or some other 40 character hash, with and without salts (mostly no salt).

All I can find on the leak so far is this:
Which doesn't say what the hash types are.

I've tried a range of modes in hashcat without any real success... at best only a small list of numerical strings (e.h. 111111111, 233442223) are founds in straight SHA1 mode. I've tried using the email address as a salt, as well as a blank salt, with no joy.

Here's a sample of what the majority of hashes from the breach look like, with email addresses removed:


Any help would be appreciated

1 Results - Page 1 of 1 -

We have a total of 211029 messages in 25903 topics.
We have a total of 22941 registered users.
Our newest registered member is bfsw.